Sciweavers

5122 search results - page 158 / 1025
» Comparing Consequence Relations
Sort
View
SASN
2003
ACM
15 years 8 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
72
Voted
GECCO
2003
Springer
15 years 8 months ago
Problem-Independent Schema Synthesis for Genetic Algorithms
Abstract. As a preprocessing for genetic algorithms, static reordering helps genetic algorithms effectively create and preserve high-quality schemata, and consequently improves th...
Yong-Hyuk Kim, Yung-Keun Kwon, Byung Ro Moon
EH
2002
IEEE
139views Hardware» more  EH 2002»
15 years 8 months ago
Evolving Cellular Automata to Model Fluid Flow in Porous Media
Fluid flow in porous media is a dynamic process that is traditionally modeled using PDE (Partial Differential Equations). In this approach, physical properties related to fluid fl...
Tina Yu, Seong Lee
AUSAI
2001
Springer
15 years 8 months ago
Wrapping Boosters against Noise
Abstract. Wrappers have recently been used to obtain parameter optimizations for learning algorithms. In this paper we investigate the use of a wrapper for estimating the correct n...
Bernhard Pfahringer, Geoffrey Holmes, Gabi Schmidb...
102
Voted
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 7 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...